Sensitive educational research

5 Sensitive educational research

Much educational research can be sensitive, in

Contents, e.g. taboo or emotionally charged several senses, and researchers have to be acutely

areas of study (Farberow 1963), e.g. criminal- aware of a variety of delicate issues. This chapter

ity, deviance, sex, race, bereavement, viol- sets out different ways in which educational

ence, politics, policing, human rights, drugs, research might be sensitive. It then takes two

poverty, illness, religion and the sacred, significant issues in the planning and conduct

lifestyle, family, finance, physical appearance, of sensitive research – sampling and access – and

power and vested interests (Lee 1993; Arditti indicates why these twin concerns might be

2002; Chambers 2003). troublesome for researchers, and how they might

Situational and contextual circumstances (Lee

be addressed. Our outline includes a discussion

of gatekeepers and their roles. Sensitive research

Intrusion into private spheres and deep raises a range of difficult, sometimes intractable,

personal experience (Lee and Renzetti 1993: ethical issues, and we set out some of these in the

5), e.g. sexual behaviour, religious practices, chapter. Investigations involving powerful people

death and bereavement, even income and age. are taken as an instance of sensitive educational

Potential sanction, risk or threat of stigma- research, and this is used as a vehicle for examining

tization, incrimination, costs or career loss several key problematic matters in this area. The

to the researcher, participants or others, e.g. chapter moves to a practical note, proffering advice

groups and communities (Lee and Renzetti on how to ask questions in sensitive research.

1993; Renzetti and Lee 1993; De Laine 2000), Finally, the chapter sets out a range of key issues

a particular issue for the researcher who studies to be addressed in the planning, conduct and

human sexuality and who, consequently, suffers reporting of sensitive research.

from ‘stigma contagion’, i.e. sharing the same stigma as those being studied (Lee 1993: 9).

Impingement on political alignments (Lee

What is sensitive research?

Sensitive research is that ‘which potentially poses O Cultural and cross-cultural factors and inhibi-

a substantial threat to those who are involved tions (Sieber 1992: 129). or have been involved in it’ (Lee 1993: 4), or O Fear of scrutiny and exposure (Payne et al.

when those studied view the research as somehow undesirable (Van Meter 2000). Sensitivity can O Threat to the researchers and to the

derive from many sources, including: family members and associates of those studied (Lee 1993); Lee (1993: 34) suggests

Consequences for the participants (Sieber and that ‘chilling’ may take place, i.e. where Stanley 1988: 49).

researchers are ‘deterred from producing or

Consequences for other people, e.g. family disseminating research’ because they anticipate members, associates, social groups and the

hostile reactions from colleagues, e.g. on wider community, research groups and

race. ‘Guilty knowledge’ may bring personal institutions (Lee 1993: 5).

and professional risk from colleagues; it

120 SENSITIVE EDUCATIONAL RESEARCH

is threatening both to researchers and to investigate. Sensitive educational research can participants (De Laine 2000: 67, 84).

act as a voice for the weak, the oppressed, those

Methodologies and conduct, e.g. when junior without a voice or who are not listened to; equally researchers conduct research on powerful

it can focus on the powerful and those in high people, when men interview women, when

profile positions.

senior politicians are involved, or where access The three kinds of sensitivities indicated above and disclosure are difficult (Simons 1989; Ball

may appear separately or in combination. The 1990; 1994a; Liebling and Shah 2001).

sensitivity concerns not only the topic itself, but also, perhaps more importantly, ‘the relationship

Sometimes all or nearly all of the issues listed between that topic and the social context’ above are present simultaneously. Indeed, in some

within which the research is conducted (Lee situations the very activity of actually undertaking

1993: 5). What appears innocent to the researcher educational research per se may be sensitive.

may be highly sensitive to the researched or This has long been the situation in totalitarian

to other parties. Threat is a major source of regimes, where permission has typically had to

sensitivity; indeed Lee (1993: 5) suggests that,

be granted from senior government officers and rather than generating a list of sensitive topics, departments in order to undertake educational

it is more fruitful to look at the conditions research. Closed societies may permit educational

under which ‘sensitivity’ arises within the research research only on approved, typically non-sensitive

process. Given this issue, the researcher will and comparatively apolitical topics. As Lee

need to consider how sensitive the educational (1993: 6) suggests: ‘research for some groups . . .

research will be, not only in terms of the is quite literally an anathema’. The very act

subject matter itself, but also in terms of the of doing the educational research, regardless of

several parties that have a stake in it, for its purpose, focus, methodology or outcome, is

example: headteachers and senior staff; parents; itself a sensitive matter (Morrison 2006). In this

students; schools; governors; local politicians and situation the conduct of educational research may

policy-makers; the researcher(s) and research hinge on interpersonal relations, local politics

community; government officers; the community; and micro-politics. What start as being simply

social workers and school counsellors; sponsors and methodological issues can turn out to be ethical

members of the public; members of the community and political/micro-political minefields.

being studied; and so on.

Lee (1993: 4) suggests that sensitive research Sensitivity inheres not only in the educational falls into three main areas: intrusive threat

topic under study, but also, much more (probing into areas which are ‘private, stressful

significantly, in the social context in which the or sacred’); studies of deviance and social control,

educational research takes place and on the likely

i.e. which could reveal information that could consequences of that research on all parties. Doing stigmatize or incriminate (threat of sanction);

research is not only a matter of designing a project and political alignments, revealing the vested

and collecting, analysing and reporting data – that interests of ‘powerful persons or institutions,

is the optimism of idealism or ignorance – but also or the exercise of coercion or domination’,

a matter of interpersonal relations, potentially or extremes of wealth and status (Lee 1993).

continual negotiation, delicate forging and As Beynon (1988: 23) says, ‘the rich and

sustaining of relationships, setback, modification powerful have encouraged hagiography, not

and compromise. In an ideal world educational critical investigation’. Indeed, Lee (1993: 8) argues

researchers would be able to plan and conduct that there has been a tendency to ‘study down’

their studies untrammelled; however, the ideal rather than ‘study up’, i.e. to direct attention

world, in the poet Yeats’s words, is ‘an image of to powerless rather than powerful groups, not

air’. Sensitive educational research exposes this least because these are easier and less sensitive

very clearly. While most educational research

SAMPLING AND ACCESS 121

Chapter

will incur sensitivities, the attraction of discussing of confidentiality may prevent this from being sensitive research per se is that it highlights what

employed).

these delicate issues might be and how they might

Screening : targeting a particular location and

be felt at their sharpest. We advise readers to canvassing within it (which may require much consider most educational research as sensitive, to

effort for little return).

anticipate what those sensitivities might be, and

Outcropping : this involves going to a particular what trade-offs might be necessary.

location where known members of the target group congregate or can be found

Sampling and access

(e.g. Humphreys’ (1970) celebrated study of homosexual ‘tearoom trade’); in education this

Walford (2001: 33) argues that gaining access and may be a particular staffroom (for teachers), becoming accepted is a slow process. Hammersley

or meeting place for students. Outcropping and Atkinson (1983: 54) suggest that gaining

risks bias, as there is no simple check for access not only is a practical matter but also

representativeness of the sample. provides insights into the ‘social organisation of

Servicing : Lee (1993: 72) suggests that it may the setting’.

be possible to reach research participants by Lee (1993: 60) suggests that there are potentially

offering them some sort of service in return serious difficulties in sampling and access in

for their participation. Researchers must be sensitive research, not least because of the problem

certain that they really are able to provide of estimating the size of the population from

the services promised. As Walford (2001: 36) which the sample is to be drawn, as members

writes: ‘people don’t buy products; they buy of particular groups, e.g. deviant or clandestine

benefits’, and researchers need to be clear on groups, will not want to disclose their associations.

the benefits offered.

Similarly, like-minded groups may not wish to

Professional informants : Lee (1993: 73) suggests open themselves to public scrutiny. They may

these could be, for example, police, doctors, have much to lose by revealing their membership

priests, or other professionals. In education and, indeed, their activities may be illicit, critical

these may include social workers and of others, unpopular, threatening to their own

counsellors. This may be unrealistic optimism, professional security, deviant and less frequent

as these very people may be bound by terms than activities in other groups, making access

of legal or ethical confidentiality or voluntary to them a major obstacle. What if a researcher

self-censorship (e.g. an AIDS counsellor, after is researching truancy, or teenage pregnancy, or

a harrowing day at work, may not wish bullying, or solvent abuse among school students,

to continue talking to a stranger about or alcohol and medication use among teachers, or

AIDS counselling, or a social worker or family relationship problems brought about by the

counsellor may be constrained by professional stresses of teaching?

confidentiality, or an exhausted teacher may Lee (1993: 61) suggests several strategies to

not wish to talk about teaching difficulties).

be used, either separately or in combination, for Further, Lee suggests that, even if such people sampling ‘special’ populations (e.g. rare or deviant

agree to participate, they may not know the populations):

full story; Lee (1993: 73) gives the example

List sampling : looking through public domain of drug users whose contacts with the police lists of, for example, the recently divorced

may be very different from their contacts with (though such lists may be more helpful to social

doctors or social workers, or, the corollary of researchers than, specifically, educational

this, the police, doctors and social workers may researchers).

not see the same group of drug users.

Multipurposing : using an existing survey to

Advertising : though this can potentially reach a reach populations of interest (though problems

wide population, it may be difficult to control

122 SENSITIVE EDUCATIONAL RESEARCH

the nature of those who respond, in terms of pointed out. For example, a headteacher may representativeness or suitability.

wish to confide in a researcher, teachers may

Networking : this is akin to snowball sampling, benefit from discussions with a researcher, wherein one set of contacts puts the researcher

students may benefit from being asked about in touch with more contacts, who puts the

their learning.

researcher in touch with yet more contacts

4 Sale (where the participants agree to the and so on. This is a widely used technique,

research).

though Lee (1993: 66) reports that it is not always easy for contacts to be passed on,

Whitty and Edwards (1994: 22) argue that in as initial informants may be unwilling to

order to overcome problems of access, ingenuity divulge members of a close-knit community.

and even the temptation to use subterfuge could On the other hand, Morrison (2006) reports

be considered: ‘denied co-operation initially by that networking is a popular technique where

an independent school, we occasionally contacted it is difficult to penetrate a formal organization

some parents through their child’s primary school such as a school, if the gatekeepers (those

and then told the independent schools we already who can grant or prevent access to others,

were getting some information about their pupils’.

e.g. the headteacher or senior staff) refuse They also add that it is sometimes necessary access. He reports the extensive use of informal

for researchers to indicate that they are ‘on the networks by researchers, in order to contact

same side’ as those being researched. 1 Indeed they friends and professional associates, and, in

report that ‘we were questioned often about our turn, their friends and professional associates,

own views, and there were times when to be thereby sidestepping the formal lines of contact

viewed suspiciously from one side proved helpful in through schools.

gaining access to the other’ (Whitty and Edwards Walford (2001: 36–47) sets out a four-step

1994: 22). This harks back to Becker’s (1968) process of gaining access:

advice to researchers to decide whose side they are on.

1 Approach (gaining entry, perhaps through a The use of snowball sampling builds in mutual friend or colleague – a link person). In

‘security’ (Lee 1993), as the contacts are those this context Walford (2001) cautions that an

who are known and trusted by the members of initial letter should be used only to gain an

the ‘snowball’. That said, this itself can lead to initial interview or an appointment, or even

bias, as relationships between participants in the to arrange to telephone the headteacher in

sample may consist of ‘reciprocity and transitivity’ order to arrange an interview, not to conduct

(Lee 1993: 67), i.e. participants may have close the research or to gain access.

relationships with one another and may not wish

2 Interest (using a telephone call to arrange to break these. Thus homogeneity of the sample’s an initial interview). In this respect Walford

attributes may result.

(2001: 43) notes that headteachers like to Such snowball sampling may alter the talk, and so it is important to let them talk,

research, for example changing random, stratified even on the telephone when arranging an

or proportionate sampling into convenience interview to discuss the research.

sampling, thereby compromising generalizability

3 Desire (overcoming objections and stressing or generating the need to gain generalizability the benefits of the research). As Walford

by synthesizing many case studies. Nevertheless, (2001: 44) wisely comments: ‘after all, schools

it often comes to a choice between accepting have purposes other than to act as research

non-probability strategies or doing nothing. sites’. He makes the telling point that the

The issues of access to people in order to research may actually benefit the school, but

conduct sensitive research may require researchers that the school may not realize this until it is

to demonstrate a great deal of ingenuity and

SAMPLING AND ACCESS 123

Chapter

forethought in their planning. Investigators have

schools/institutions not wishing to be identifi- to be adroit in anticipating problems of access, and

able, even with protections guaranteed set up their studies in ways that circumvent such

local political factors that impinge on the problems, preventing them from arising in the

school/educational institution first place, e.g. by exploring their own institutions

teachers’/participants’ fear of being identi-

or personal situations, even if this compromises fied/traceable, even with protections guaran- generalizability. Such anticipatory behaviour can

teed

lead to a glut of case studies, action research and

fear of participation by teachers (e.g. if they accounts of their own institutions, as these are the

say critical matters about the school or others only kinds of research possible, given the problem

they could lose their contracts) of access.

unwillingness of teachers to be involved because of their workload

the principal deciding on whether to involve

Gatekeepers

the staff, without consultation with the staff Access might be gained through gatekeepers, that O schools’ fear of criticism/loss of face or

is, those who control access. Lee (1993: 123)

reputation

suggests that ‘social access crucially depends on O the sensitivity of the research – the issues being establishing interpersonal trust. Gatekeepers play a

investigated

significant role in research, particularly in ethno- O the power/position of the researcher (e.g. if the graphic research (Miller and Bell 2002: 53). They

researcher is a junior or senior member of staff control access and re-access (Miller and Bell

or an influential person in education). 2002: 55). They may provide or block access;

they may steer the course of a piece of research, Risk reduction may result in participants ‘shepherding the fieldworker in one direction or

imposing conditions on research (e.g. on what another’ (Hammersley and Atkinson 1983: 65), or

information investigators may or may not use; to exercise surveillance over the research.

whom the data can be shown; what is ‘public’; Gatekeepers may wish to avoid, contain, spread

what is ‘off the record’ (and what should be or control risk and therefore may bar access

done with off-the-record remarks). It may also or make access conditional. Making research

lead to surveillance/‘chaperoning’ of the researcher conditional may require researchers to change

while the study is being conducted on site (Lee the nature of their original plans in terms of

methodology, sampling, focus, dissemination, Gatekeepers may want to ‘inspect, modify or reliability and validity, reporting and control of

suppress the published products of the research’ data (Morrison 2006).

(Lee 1993: 128). They may also wish to use the Morrison (2006) found that in conducting

research for their own ends, i.e. their involvement sensitive educational research there were problems

may not be selfless or disinterested, or they may of

wish for something in return, e.g. for the researcher to include in the study an area of interest to the

gaining access to schools and teachers gatekeeper, or to report directly – and maybe ex-

gaining permission to conduct the research clusively – to the gatekeeper. The researcher has to (e.g. from school principals)

negotiate a potential minefield here, for example,

resentment by principals not to be seen as an informer for the headteacher.

people vetting which data could be used As Walford (2001: 45) writes: ‘headteachers [may]

finding enough willing participants for the suggest that researchers observe certain teachers sample

whom they want information about’. Researchers

schools/institutions/people not wishing to may need to reassure participants that their data divulge information about themselves

will not be given to the headteacher.

124 SENSITIVE EDUCATIONAL RESEARCH

On the other hand, Lee (1993: 127) suggests

Box 5.1

that the researcher may have to make a few Issues of sampling and access in sensitive research concessions in order to be able to undertake the

investigation, i.e. that it is better to do a little of

the gatekeeper’s bidding rather than not to be able How to calculate the population and sample.

How representative of the population the sample

to do the research at all.

may or may not be.

In addition to gatekeepers the researcher may

What kind of sample is desirable (e.g. random), but

find a ‘sponsor’ in the group being studied. A

what kind may be the only sort that is practicable

sponsor may provide access, information and

(e.g. snowball).

support. A celebrated example of this is in the How to use networks for reaching the sample, and

what kinds of networks to utilize.

figure of ‘Doc’ in Whyte’s classic study of Street

How to research in a situation of threat to the

Corner Society (1993: the original study published

participants (including the researcher).

in 1943). Here Doc, a leading gang figure in the

How to protect identities and threatened groups.

Chicago street corner society, is quoted as saying How to contact the hard-to-reach.

(p. 292): How to secure and sustain access.

How to find and involve gatekeepers and sponsors.

You tell me what you want me to see, and we’ll What to offer gatekeepers and sponsors.

On what matters compromise may need to be arrange it. When you want some information, I’ll ask

negotiated.

for it, and you listen. When you want to find out their

On what matters can there be no compromise. philosophy of life, I’ll start an argument and get it for

How to negotiate entry and sustained field relations. you . . .. You won’t have any trouble. You come in as

What services the researcher may provide. a friend. O How to manage initial contacts with potential

(Whyte 1993: 292) groups for study.

As Whyte writes: My relationship with Doc changed rapidly . . .. At

first he was simply a key informant – and also my 1993 edition, Whyte reflects on the study with the sponsor. As we spent more time together, I ceased to

question as to whether he exploited Doc (p. 362); treat him as a passive informant. I discussed with him

it is a salutary reminder of the essential reciprocity quite frankly what I was trying to do, what problems

that might be involved in conducting sensitive were puzzling me, and so on . . . so that Doc became,

research.

in a real sense, a collaborator in the research. In addressing issues of sampling and access, there

are several points that arise from the discussion Whyte comments on how Doc was able to give

(Whyte 1993: 301)

(Box 5.1).

him advice on how best to behave when meeting Much research stands or falls on the sampling. people as part of the research:

These points reinforce our view that, rather than barring the research altogether, compromises may

Go easy on that ‘who’, ‘what’, ‘why’, ‘when’, ‘where’ have to be reached in sampling and access. It may stuff, Bill. You ask those questions and people will

be better to compromise rather than to abandon clam up on you. If people accept you, you can just

the research altogether.

hang around, and you’ll learn the answers in the long run without even having to ask the questions’

(Whyte 1993: 303)

Ethical issues in sensitive research

Indeed Doc played a role in the writing of the

A difficulty arises in sensitive research in that research: ‘As I wrote, I showed the various parts to

researchers can be party to ‘guilty knowledge’ (De Doc and went over them in detail. His criticisms

Laine 2000) and have ‘dirty hands’ (Klockars were invaluable in my revision’ (p. 341). In his

1979) about deviant groups or members of a school

ETHICAL ISSUES IN SENSITIVE RESEARCH 125

Chapter

who may be harbouring counter-attitudes to those deny access. The ethical issue of informed consent, prevailing in the school’s declared mission. Pushed

in this case, is violated in the interests of exposing further, this means that researchers will need to

matters that are in the public interest. decide the limits of tolerance, beyond which they

To the charge that this is akin to spy- will not venture. For example, in Patrick’s (1973)

ing, Mitchell (1993: 46) makes it clear that there

study of a Glasgow gang, the researcher is witness is a vast difference between covert research and to a murder. Should he report the matter to the

spying:

police and, thereby, ‘blow his cover’, or remain silent in order to keep contact with the gang,

‘Spying is ideologically proactive, whereas thereby breaking the law, which requires a murder

research is ideologically na¨ıve’ (Mitchell 1993: to be reported?

46). Spies, he argues, seek to further a particular In interviewing students they may reveal

value system or ideology; research seeks to sensitive matters about themselves, their family,

understand rather than to persuade. their teachers, and the researcher will need to

Spies have a sense of mission and try to achieve decide whether and how to act on this kind of

certain instrumental ends, whereas research information. What should the researcher do, for

has no such specific mission. example, if, during the course of an interview with

Spies believe that they are morally superior

a teacher about the leadership of the headteacher, to their subjects, whereas researchers have no the interviewee indicates that the headteacher

such feelings; indeed, with reflexivity being has had sexual relations with a parent, or has

so important, they are sensitive to how their an alcohol problem? Does the researcher, in

own role in the investigation may distort the such cases, do nothing in order to gain research

research.

Spies are supported by institutions which train is in the public interest – the protection of an

knowledge, or does the researcher act? What

them to behave in certain ways of subterfuge, individual participant’s private life, or the interests

whereas researchers have no such training. of the researcher? Indeed Lee (1993: 139) suggests

Spies are paid to do the work, whereas that some participants may even deliberately

researchers often operate on a not-for-profit engineer situations whereby the researcher gains

or individualistic basis.

‘guilty knowledge’ in order to test the researcher’s affinities: ‘trust tests’.

On the other hand, not to gain informed consent Ethical issues are thrown into sharp relief in

could lead to participants feeling duped, very sensitive educational research. The question of

angry, used and exploited, when the results of the covert research rises to the fore, as the study

research are eventually published and they realize of deviant or sensitive situations may require

that they have been studied without their approval the researcher to go under cover in order to

consent. 2 The researcher is seen as a predator (Lee obtain data. Covert research may overcome

1993: 157), using the research ‘as a vehicle for ‘problems of reactivity’ (Lee 1993: 143) wherein

status, income or professional advancement which the research influences the behaviour of the

is denied to those studied’. As Lee (1993: 157) participants (Hammersley and Atkinson 1983:

remarks, ‘it is not unknown for residents in some 71). It may also enable the researcher to obtain

ghetto areas of the United States to complain insiders’ true views, for, without the cover of those

wryly that they have put dozens of students through being researched not knowing that they are being

graduate school’. Further, the researched may have researched, entry could easily be denied, and access

no easy right of reply; feel misrepresented by the to important areas of understanding could be lost.

research; feel that they have been denied a voice; This is particularly so in the case of researching

have wished not to be identified and their situation powerful people who may not wish to disclose

put into the public arena; feel that they have been information and who, therefore, may prevent or

exploited.

126 SENSITIVE EDUCATIONAL RESEARCH

The cloak of anonymity is often vital in sensitive interest (e.g. a school’s failure to keep to proper research, such that respondents are entirely

accounting procedures) is brought to light? Should untraceable. This raises the issue of ‘deductive

the researcher follow up the matter privately, disclosure’ (Boruch and Cecil 1979), wherein it is

publicly, or not at all? If it is followed up possible to identify individuals (people, schools,

then certainly harm may come to the school’s departments etc.) in question by reconstructing

officers.

and combining data. Researchers should guard Ethical issues in the conduct of research are against this possibility. Where the details that are

thrown into sharp relief against a backdrop of presented could enable identification of a person

personal, institutional and societal politics, and (e.g. in a study of a school there may be only

the boundaries between public and private spheres one male teacher aged 50 who teaches biology,

are not only relative but also highly ambiguous. such that putting a name is unnecessary, as he

The ethical debate is heightened, for example will be identifiable), it may be incumbent on the

concerning the potential tension between the researcher not to disclose such details, so that

individual’s right to privacy versus the public’s readers, even if they wished to reassemble the

right to know and the concern not to damage details in order to identify the respondent, are

or harm individuals versus the need to serve the unable to do so.

public good. Because public and private spheres The researcher may wish to preserve confiden-

may merge, it is difficult, if not impossible, to tiality, but may also wish to be able to gather data

resolve such tensions straightforwardly (cf. Day from individuals on more than one occasion. In

1985; Lee 1993). As Walford (2001: 30) writes: this case a ‘linked file’ system (Lee 1993: 173) can

‘the potential gain to public interest . . . was great.

be employed. Here three files are kept; in the first There would be some intrusion into the private file the data are held and arbitrary numbers are as-

lives of those involved, but this could be justified signed to each participant; the second file contains

in research on . . . an important policy issue’. The the list of respondents; the third file contains the

end justified the means.

list of information necessary to be able to link the These issues are felt most sharply if the arbitrarily assigned numbers from the first file to

research risks revealing negative findings. To the names of the respondents in the second, and

expose practices to research scrutiny may be like this third file is kept by a neutral ‘broker’, not the

taking the plaster off an open wound. What researcher. This procedure is akin to double-blind

responsibility to the research community does the clinical experiments, in which the researcher does

researcher have? If a negative research report is not know the names of those who are or are not

released, will schools retrench, preventing future receiving experimental medication or a placebo.

research in schools from being undertaken (a That this may be easier in respect of quantita-

particular problem if the researcher wishes to tive rather than qualitative data is acknowledged

return or wishes not to prevent further researchers by Lee (1993: 179).

from gaining access)? Whom is the researcher Clearly, in some cases, it is impossible for

serving – the public, the schools, the research individual people, schools and departments not

community? The sympathies of the researcher to be identified, for example schools may be highly

may be called into question here; politics and distinctive and, therefore, identifiable (Whitty

ethics may be uncomfortable bedfellows in such and Edwards 1994: 22). In such cases clearance

circumstances. Negative research data, such as may need to be obtained for the disclosure of

the negative hidden curriculum of training for information. This is not as straightforward as

conformity in schools (Morrison 2005a) may not it may seem. For example, a general principle

endear researchers to schools. This can risk stifling of educational research is that no individuals

educational research – it is simply not worth the should be harmed (non-maleficence), but what

personal or public cost. As Simons (2000: 45) if a matter that is in the legitimate public

writes: ‘the price is too high’.

RESEARCHING POWERFUL PEOPLE 127

Chapter

Further, Mitchell (1993: 54) writes that ‘timo- may say nothing rather than criticize (Burgess rous social scientists may excuse themselves

1993; Morrison 2001a; 2002b). from the risk of confronting powerful, privileged,

The field of ethics in sensitive research is and cohesive groups that wish to obscure their

different from ethics in everyday research in actions and interests from public scrutiny’ (see

significance rather than range of focus. The same

also Lee 1993: 8). Researchers may not wish to issues as must be faced in all educational research take the risk of offending the powerful or of

are addressed here, and we advise readers to review placing themselves in uncomfortable situations.

Chapter 2 on ethics. However, sensitive research As Simons and Usher (2000: 5) remark: ‘politics

highlights particular ethical issues very sharply; and ethics are inextricably entwined’.

these are presented in Box 5.2.

In private, students and teachers may criticize These are only introductory issues. We refer their own schools, for example, in terms of

the reader to Chapter 2 for further discussion of management, leadership, work overload and stress,

these and other ethical issues. The difficulty with but they may be reluctant to do so in public and,

ethical issues is that they are ‘situated’ (Simons indeed, teachers who are on renewable contracts

and Usher 2000), i.e. contingent on specific local will not bite the hand that feeds them; they

circumstances and situations. They have to be negotiated and worked out in relation to the specifics of the situation; universal guidelines may help but they don’t usually solve the practical

problems, they have to be interpreted locally. Ethical issues in sensitive research

Box 5.2

Researching powerful people

How does the researcher handle ‘guilty knowledge’

and ‘dirty hands’?

A branch of sensitive research concerns that which

Whose side is the researcher on? Does this need to

is conducted on, or with, powerful people, those

be disclosed? What if the researcher is not on the

side of the researched?

in key positions, or elite institutions. In education,

When is covert research justified?

for example, this would include headteachers and

When is the lack of informed consent justified?

senior teachers, politicians, senior civil servants,

Is covert research spying?

decision-makers, local authority officers and school

How should the researcher overcome the charge of

governors. This is particularly the case in respect of

exploiting the participants (i.e. treating them as

objects instead of as subjects of research)?

research on policy and leadership issues (Walford

How should the researcher address confidentiality

1994a: 3). Researching the powerful is an

and anonymity?

example of ‘researching up’ rather than the more

How should the balance be struck between the individual’s right to privacy and the public’s right to

conventional ‘researching down’ (e.g. researching

children, teachers and student teachers).

know?

What is really in the public interest?

What makes the research sensitive is that it is

How to handle the situation where it is unavoidable

often dealing with key issues of policy generation

to identify participants?

and decision-making, or issues about which there is

What responsibility does the researcher have to the research community, some of whom may wish to

high-profile debate and contestation, as issues of a

politically sensitive nature. Policy-related research

conduct further research in the field?

How does the researcher handle frightened or

is sensitive. This can be also one of the reasons

threatened groups who may reveal little?

why access is frequently refused. The powerful are

What protections are in the research, for whom,

those who exert control to secure what they want

and from what?

or can achieve, those with great responsibility and whose decisions have significant effects on large numbers of people.

What obligations does the researcher have?

128 SENSITIVE EDUCATIONAL RESEARCH

Academic educational research on the powerful powerful can produce difficulties which include may be unlike other forms of educational research

‘misrepresentation of the research intention, loss in that confidentiality may not be able to be

of researcher control, mediation of the research assured. The participants are identifiable and

process, compromise and researcher dependence’. public figures. This may produce ‘problems of

Research with powerful people usually takes censorship and self-censorship’ (Walford 1994c:

place on their territory, under their conditions 229). It also means that information given in

and agendas (a ‘distinctive civil service voice’: Fitz confidence and ‘off the record’ unfortunately

and Halpin 1994: 42), working within discourses may have to remain so. The issue raised in

set by the powerful (and, in part, reproduced by researching the powerful is the disclosure of

the researchers), and with protocols concerning identities, particularly if it is unclear what has

what may or may not be disclosed (e.g. been said ‘on the record’ and ‘off the record’ (Fitz

under a government’s Official Secrets Act or and Halpin 1994: 35–6).

privileged information), within a world which Fitz and Halpin (1994) indicate that the

may be unfamiliar and, thereby, disconcerting government minister whom they interviewed

for researchers and with participants who may stated, at the start of the interview, what was

be overly assertive, and sometimes rendering the to be attributable. They also report that they

researcher as having to pretend to know less than used semi-structured interviews in their research

he or she actually knows. As Fitz and Halpin of powerful people, valuing both the structure and

(1994: 40) commented: ‘we glimpsed an unfamiliar the flexibility of this type of interview, and that

world that was only ever partially revealed’, and they gained permission to record the interviews

one in which they did not always feel comfortable. for later transcription, for the sake of a research

Similarly, Ball (1994b: 113) suggests that ‘we need record. They also used two interviewers for each

to recognize . . . the interview as an extension of session, one to conduct the main part of the

the ‘‘play of power’’ rather than separate from it, interview and the other to take notes and ask

merely a commentary upon it’, and that, when supplementary questions; having two interviewers

interviewing powerful people ‘the interview is present also enabled a post-interview cross-check

both an ethnographic . . . and a political event’. to be undertaken. Indeed having two questioners

As Walford (1994c) remarks: helped to negotiate the way through the interview

in which advisers to the interviewee were also Those in power are well used to their ideas being present, to monitor the proceedings and interject taken notice of. They are well able to deal with where deemed fitting, and to take notes (Fitz and interviewers, to answer and avoid particular questions

Halpin 1994: 38, 44, 47). to suit their own ends, and to present their own role Fitz and Halpin (1994: 40) comment on in events in a favourable light. They are aware of the considerable amount of gatekeeping that what academic research involves, and are familiar was present in researching the powerful, in with being interviewed and having their words tape- terms recorded. In sum, their power in the educational of access to people (with officers guarding entrances and administrators deciding world is echoed in the interview situation, and whether interviews will take place), places (‘elite interviews pose little threat to their own positions. settings’), timing (and scarcity of time with (Walford 1994c: 225)

busy respondents), ‘conventions that screen off McHugh (1994: 55) comments that access to the routines of policy-making from the public

powerful people may take place not only through and the academic gaze’, conditional access and

formal channels but also through intermediaries conduct of the research (‘boundary maintenance’)

who introduce researchers to them. Here his own monitoring and availability (Fitz and Halpin

vocation as a priest helped him to gain access 1994: 48–9). Gewirtz and Ozga (1994: 192–3)

to powerful Christian policy-makers and, as he suggest that gatekeeping in researching the

was advised, ‘if you say whom you have met,

RESEARCHING POWERFUL PEOPLE 129

Chapter

they’ll know you are not a way-out person who of libel actions if public figures are named. He will distort what they say’ (McHugh 1994: 56).

asks (1994b: 84) ‘to what extent is it right Access is a significant concern in researching the

to allow others to believe that you agree with powerful, particularly if the issues being researched

them?’, even if you do not? Should the researcher’s are controversial or contested. Walford (1994c:

own political, ideological or religious views be

222, 223) suggests that it can be eased through declared? As Mickelson (1994: 147) states: ‘I informal and personal ‘behind the scenes’ contacts:

was not completely candid when I interviewed ‘the more sponsorship that can be obtained, the

these powerful people. I am far more genuine better’, be it institutional or personal. Access can

and candid when I am interviewing non-powerful

be eased if the research is seen to be ‘harmless’ people’. Deem (1994: 156) reports that she and her (Walford 1994c: 223); in this respect Walford

co-researcher encountered ‘resistance and access reports that female researchers may be at an

problems in relation to our assumed ideological advantage in that they are viewed as more harmless

opposition to Conservative government education and non-threatening. Walford also makes the

reforms’, where access might be blocked ‘on the point that ‘persistence pays’ (p. 224); as he writes

grounds that ours was not a neutral study’. elsewhere (Walford 2001: 31), ‘access is a process

Mickelson (1994: 147) takes this further in and not a once-only decision’.

identifying an ethical dilemma when ‘at times, the McHugh (1994) also reports the need for

powerful have uttered abhorrent comments in the meticulous preparation for an interview with the

course of the interview’. Should the researcher say powerful person, to understand the full picture

nothing, thereby tacitly condoning the speaker’s and to be as fully informed as the interviewee,

comments, or speak out, thereby risking closing in terms of facts, information and terminology,

the interview? She contends that, in retrospect, so that it is an exchange between the informed

she wished that she had challenged these views, rather than an airing of ignorance, i.e. to do

and had been more assertive (Mickelson 1994: one’s homework. He also states the need for the

148). Walford (2001) reports the example of an interview questions to be thoroughly planned and

interview with a church minister whose views prepared, with very careful framing of questions.

included ones with which he disagreed: McHugh (1994: 60, 62) suggests that during the

interview it is important for the interviewer not AIDS is basically a homosexual disease . . . and is only to be as flexible as possible, to follow the doing a very effective job of ridding the population

train of thought of the respondent, but also to be of undesirables. In Africa it’s basically a non-existent persistent if the interviewee does not address the disease in many places . . . . If you’re a woolly woofter, issue. However, he reminds us that ‘an interview you get what you deserve . . . . I would never employ

is of course not a courtroom’ (p. 62) and so a homosexual to teach at my school. tact, diplomacy and – importantly – empathy are

(Walford 2001: 137) essential. Diplomacy in great measure is necessary

In researching powerful people Mickelson when tackling powerful people about issues that

(1994: 132) observes that they are rarely women, might reveal their failure or incompetence, and

yet researchers are often women. This gender powerful people may wish to exercise control over

divide might prove problematic. Deem (1994: which questions they answer. Preparation for the

157) reports that, as a woman, she encountered conduct as well as the content of the interview

greater difficulty in conducting research than did is vital.

her male colleague, even though, in fact, she There are difficulties in reporting sensitive

held a more senior position than him. On the research with the powerful, as charges of bias may

other hand, she reports that males tended to be

be difficult to avoid, not least because research more open with female than male researchers, reports and publications are placed in the public

as females researchers were regarded as less domain. Walford (2001: 141) indicates the risk

important. Gewirtz and Ozga (1994) report:

130 SENSITIVE EDUCATIONAL RESEARCH

Box 5.3

suggest that while short questions may be useful Researching powerful people

for gathering information about attitudes, longer questions are more suitable for asking questions

about behaviour, and can include examples to

What renders the research sensitive.

How to gain and sustain access to powerful people.

which respondents may wish to respond. Longer

How much the participants are likely to disclose or

questions may reduce the under-reporting of the

withhold.

frequency of behaviour addressed in sensitive

What is on and off the record.

topics (for example, the use of alcohol or

How to prepare for interviews with powerful people.

medication by stressed teachers). On the other

hand, the researcher has to be cautious to avoid

How to probe and challenge powerful people.

How to conduct interviews that balance the

tiring, emotionally exhausting or stressing the

interviewer’s agenda and the interviewee’s agenda

participant by a long question or interview.

and frame of reference.

Lee (1993: 78) advocates using familiar words

How to reveal the researcher’s own knowledge, preparation and understanding of the key issues.

in questions as these can reduce a sense

The status of the researcher vis-`a-vis the

of threat in addressing sensitive matters and

participants.

help the respondent to feel more relaxed.

Who should conduct interviews with powerful

He also suggests the use of ‘vignettes’: ‘short

people.

descriptions of a person or a social situation

How neutral and accepting the researcher should be with the participant.

which contain precise references to what are

Whether to identify the participants in the

thought to be the most important factors in the

reporting.

decision-making or judgement-making processes

How to balance the public’s right to know and the

of respondents’ (Lee 1993: 79). These can not

individual’s right to privacy.

only encapsulate concretely the issues under study,

What is in the public interest.

but also deflect attention away from personal sensitivities by projecting them onto another external object – the case or vignette – and the respondent can be asked to react to them personally, e.g. ‘What would you do in this

we felt [as researchers] that we were viewed as women

situation?’

in very stereotypical ways, which included being seen as receptive and supportive, and that we were obliged

Researchers investigating sensitive topics have to collude, to a degree, with that version of ourselves

to be acutely percipient of the situation because it was productive of the project.

themselves. For example, their non-verbal communication may be critical in interviews.

They must, therefore, give no hint of judgement, In approaching researching powerful people, then,

(Gewirtz and Ozga 1994: 196)

support or condemnation. They must avoid it is wise to consider several issues. These are set

counter-transference (projecting the researchers’ out in Box 5.3.

own views, values, attitudes biases, background onto the situation). Interviewer effects are discussed in Chapter 16 in connection with

Asking questions

sensitive research; these effects concern the In asking questions in research, Sudman and

characteristics of the researcher (e.g. sex, Bradburn (1982: 50–1) suggest that open

race, age, status, clothing, appearance, rapport, questions may be preferable to closed questions

background, expertise, institutional affiliation, and long questions may be preferable to short

political affiliation, type of employment or questions. Both of these enable respondents to

vocation, e.g. a priest). Females may feel more answer in their own words, which might be

comfortable being interviewed by a female; males more suitable for sensitive topics. Indeed they

may feel uncomfortable being interviewed by a

CONCLUSION 131

Chapter

female; powerful people may feel insulted by the interviewer power over the respondent and being interviewed by a lowly, novice research

make the respondent feel vulnerable; (e) what assistant. Interviewer effects also concern the

the interviewer should do with information expectations that the interviewers may have

that may act against the interests of the of the interview (Lee 1993: 99). For example,

people who gave it (e.g. if some groups in

a researcher may feel apprehensive about, or society say that they are not clever enough uncomfortable with, an interview about a sensitive

to handle higher or further education); and matter. Bradburn and Sudman (1979, in Lee

(f) how to handle the conduct of the interview 1993: 101) report that interviewers who did not

(e.g. conversational, formal, highly structured, anticipate difficulties in the interview achieved a

highly directed).

5–30 per cent higher level of reporting on sensitive

Handling the conditions under which the topics than those who anticipated difficulties. This

exchange takes place Lee (1993: 112) suggests suggests the need for interviewer training.

that interviews on sensitive matters should Lee (1993: 102–14) suggests several issues to be

‘have a one-off character’, i.e. the respondent addressed in conducting sensitive interviews:

should feel that the interviewer and the interviewee may never meet again. This can

How to approach the topic (in order to secure trust, and can lead to greater disclosure prevent participants’ inhibitions and to help

than in a situation where a closer relationship them address the issue in their preferred way).

between interviewer and interviewee exists. Here the advice is to let the topic ‘emerge

On the other hand, this does not support gradually over the course of the interview’ (Lee

the development of a collaborative research 1993: 103) and to establish trust and informed

relationship (Lee 1993: 113). consent.

How to deal with contradictions, complexities Much educational research is more or less and emotions (which may require training and

sensitive; it is for the researcher to decide how supervision of interviewers); how to adopt an

to approach the issue of sensitivities and how accepting and non-judgemental stance, how to

to address their many forms, allegiances, ethics, handle respondents who may not be people

access, politics and consequences. whom interviewers particularly like or with

whom they agree).

Conclusion

How to handle the operation of power and control in the interview: (a) where differences

In approaching educational research, our advice of power and status operate, where the

is to consider it to be far from a neat, clean, interviewer has greater or lesser status than

tidy, unproblematic and neutral process, but the respondent and where there is equal status

to regard it as shot through with actual and between the interviewer and the respondent;

potential sensitivities. With this in mind we (b) how to handle the situation where the

have resisted the temptation to provide a list interviewer wants information but is in no

of sensitive topics, as this could be simplistic position to command that this be given

and overlook the fundamental issue which is and where the respondent may or may

that it is the social context of the research that not wish to disclose information; (c) how

makes the research sensitive. What may appear to handle the situation wherein powerful

to the researcher to be a bland and neutral study people use the interview as an opportunity for

can raise deep sensitivities in the minds of the lengthy and perhaps irrelevant self-indulgence;

participants. We have argued that it is these that (d) how to handle the situation in which the

often render the research sensitive rather than interviewer, by the end of the session, has

the selection of topics of focus. Researchers have information that is sensitive and could give

to consider the likely or possible effects of the

132 SENSITIVE EDUCATIONAL RESEARCH

research project, conduct, outcomes, reporting 2000), i.e. contingent on particular situations and dissemination not only on themselves but

rather than largely on ethical codes and guidelines. also on the participants, on those connected to

In this respect sensitive educational research the participants and on those affected by, or with

is like any other research, but sharper in the

a stakeholder interest in, the research (i.e. to criticality of ethical issues. Also, behind many of consider ‘consequential validity’: the effects of the

these questions of sensitivity lurks the nagging research). This suggests that it is wise to be cautious

issue of power: who has it, who does not, and to regard all educational research as potentially

how it circulates around research situations (and sensitive. There are several questions that can be

with what consequences), and how it should be asked by researchers, in their planning, conduct,

addressed. Sensitive educational research is often reporting and dissemination of their studies, and

as much a power play as it is substantive. We advise we present these in Box 5.4.

researchers to regard most educational research as These questions reinforce the importance of

involving sensitivities; these need to be identified regarding ethics as ‘situated’ (Simons and Usher

and addressed.

Box 5.4

Key questions in considering sensitive educational research

What renders the research sensitive?

What are the obligations of the researcher, to whom, and how will these be addressed? How do these obligations manifest themselves?

What is the likely effect of this research (at all stages) to be on participants (individuals and groups), stakeholders, the researcher, the community? Who will be affected by the research, and how?

Who is being discussed and addressed in the research?

What rights of reply and control do participants have in the research?

What are the ethical issues that are rendered more acute in the research?

Over what matters in the planning, focus, conduct, sampling, instrumentation, methodology, reliability, analysis, reporting and dissemination might the researcher have to compromise in order to effect the research? On what can there be compromise? On what can there be no compromise?

What securities, protections (and from what), liabilities and indemnifications are there in the research, and for whom? How can these be addressed?

Who is the research for? Who are the beneficiaries of the research? Who are the winners and losers in the research (and about what issues)?

What are the risks and benefits of the research, and for whom? What will the research ‘deliver’ and do?

Should researchers declare their own values, and challenge those with which they disagree or consider to be abhorrent?

What might be the consequences, repercussions and backlash from the research, and for whom?

What sanctions might there be in connection with the research?

What has to be secured in a contractual agreement, and what is deliberately left out?

What guarantees must and should the researcher give to the participants?

What procedures for monitoring and accountability must there be in the research?

What must and must not, should and should not, may or may not, could or could not be disclosed in the research?

Should the research be covert, overt, partially overt, partially covert, honest in its disclosure of intentions?

Should participants be identifiable and identified? What if identification is unavoidable?

How will access and sampling be secured and secure respectively?

Dokumen yang terkait

Analisis Komparasi Internet Financial Local Government Reporting Pada Website Resmi Kabupaten dan Kota di Jawa Timur The Comparison Analysis of Internet Financial Local Government Reporting on Official Website of Regency and City in East Java

19 819 7

ANTARA IDEALISME DAN KENYATAAN: KEBIJAKAN PENDIDIKAN TIONGHOA PERANAKAN DI SURABAYA PADA MASA PENDUDUKAN JEPANG TAHUN 1942-1945 Between Idealism and Reality: Education Policy of Chinese in Surabaya in the Japanese Era at 1942-1945)

1 29 9

Implementasi Prinsip-Prinsip Good Corporate Governance pada PT. Mitra Tani Dua Tujuh (The Implementation of the Principles of Good Coporate Governance in Mitra Tani Dua Tujuh_

0 45 8

Improving the Eighth Year Students' Tense Achievement and Active Participation by Giving Positive Reinforcement at SMPN 1 Silo in the 2013/2014 Academic Year

7 202 3

Improving the VIII-B Students' listening comprehension ability through note taking and partial dictation techniques at SMPN 3 Jember in the 2006/2007 Academic Year -

0 63 87

An Analysis of illocutionary acts in Sherlock Holmes movie

27 148 96

The Effectiveness of Computer-Assisted Language Learning in Teaching Past Tense to the Tenth Grade Students of SMAN 5 Tangerang Selatan

4 116 138

The correlation between listening skill and pronunciation accuracy : a case study in the firt year of smk vocation higt school pupita bangsa ciputat school year 2005-2006

9 128 37

Existentialism of Jack in David Fincher’s Fight Club Film

5 71 55

Phase response analysis during in vivo l 001

2 30 2